Command line Mikrotik exploitation tool for RouterOS up to 6.38.4
Project description
mikrot8over
=========
Command line Mikrotik exploitation tool.
It's using Mikrotik exploit from Vault 7 CIA Leaks automation tool
Takeovers up to RouterOS 6.38.4.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
mikrot8over-1.0.tar.gz
(4.0 kB
view hashes)
Built Distributions
Close
Hashes for mikrot8over-1.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 47fe6aa377a438c4782d5d65a5c7ea276ee1546ba5a08e6123b231dcfa3b51b6 |
|
MD5 | b2e936c666269b4fc0613f612c1b83ae |
|
BLAKE2b-256 | b9fa02c6a2568f4a064a5bf0cac5832965cd40ccdd1b9a2348cad25e2f599291 |
Close
Hashes for mikrot8over-1.0-py2-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e287519116913495b20596d9e1cf4829438045e2b724a4bb73c561116a440865 |
|
MD5 | 2e826cedf86056e8172eecdde73f7c45 |
|
BLAKE2b-256 | f53198cbb5db2bdec07923d67e0670408c1bdd2ac0286f0f5c66844aa3b4f809 |